Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
How to break the direct RSA-implementation of mixes
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Information retrieval: data structures and algorithms
Information retrieval: data structures and algorithms
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Tarzan: a peer-to-peer anonymizing network layer
Proceedings of the 9th ACM conference on Computer and communications security
A new privacy model for hiding group interests while accessing the Web
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Proceedings of the First International Workshop on Information Hiding
From a Trickle to a Flood: Active Attacks on Several Mix Types
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
ACSAC '96 Proceedings of the 12th Annual Computer Security Applications Conference
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Mixminion: Design of a Type III Anonymous Remailer Protocol
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Practical Anonymity for the Masses with Mix-Networks
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Convex Optimization
Authorization and Privacy for Semantic Web Services
IEEE Intelligent Systems
Low-Cost Traffic Analysis of Tor
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
PRAW—A PRivAcy model for the Web: Research Articles
Journal of the American Society for Information Science and Technology
Privacy practices of Internet users: self-reports versus observed behavior
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Specification of a framework for the anonymous use of privileges
Telematics and Informatics - Special issue: Developing a culture of privacy in the global village
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Integrating Folksonomies with the Semantic Web
ESWC '07 Proceedings of the 4th European conference on The Semantic Web: Research and Applications
The SPARTA pseudonym and authorization system
Science of Computer Programming
Evaluating similarity measures for emergent semantics of social tagging
Proceedings of the 18th international conference on World wide web
A Comparative Study of Online Privacy Policies and Formats
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Private location-based information retrieval through user collaboration
Computer Communications
Privacy preservation improvement by learning optimal profile generation rate
UM'03 Proceedings of the 9th international conference on User modeling
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Optimized query forgery for private information retrieval
IEEE Transactions on Information Theory
Coprivacy: towards a theory of sustainable privacy
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
A privacy-preserving architecture for the semantic web based on tag suppression
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
A trust-aware tag-based privacy control for eHealth 2.0
Proceedings of the 2011 conference on Information technology education
Broadcast channels with confidential messages
IEEE Transactions on Information Theory
Least squares quantization in PCM
IEEE Transactions on Information Theory
OB-PWS: Obfuscation-Based Private Web Search
SP '12 Proceedings of the 2012 IEEE Symposium on Security and Privacy
A multi-layer framework for personalized social tag-based applications
Data & Knowledge Engineering
Measuring the privacy of user profiles in personalized information systems
Future Generation Computer Systems
Hi-index | 0.00 |
Leveraging on the principle of data minimization, we propose tag suppression, a privacy-enhancing technique for the semantic Web. In our approach, users tag resources on the Web revealing their personal preferences. However, in order to prevent privacy attackers from profiling users based on their interests, they may wish to refrain from tagging certain resources. Consequently, tag suppression protects user privacy to a certain extent, but at the cost of semantic loss incurred by suppressing tags. In a nutshell, our technique poses a trade-off between privacy and suppression. In this paper, we investigate this trade-off in a mathematically systematic fashion and provide an extensive theoretical analysis. We measure user privacy as the entropy of the user's tag distribution after the suppression of some tags. Equipped with a quantitative measure of both privacy and utility, we find a close-form solution to the problem of optimal tag suppression. Experimental results on a real-world tagging application show how our approach may contribute to privacy protection.